Denial-of-Service Attacks on LoRaWAN

Research output: Chapter in Book/Report/Conference proceedingConference Article in proceedingAcademicpeer-review

426 Downloads (Pure)

Abstract

LoRaWAN is the dominant protocol for communication in low-power Wide Area Networks in several European countries, and is being used increasingly in other parts of the world. We identified three vulnerabilities in the LoRaWAN protocol specification that can be used for launching Denial-of-Service (DoS) attacks against end-devices in a LoRaWAN network. We validated that these vulnerabilities can be exploited for DoS attacks by creating and simulating Coloured Petri Net models of relevant parts of the LoRaWAN protocol.

Original languageEnglish
Title of host publicationARES 2018 - 13th International Conference on Availability, Reliability and Security
Place of PublicationNew York, NY, USA
Publisheracm
Chapter17:1-17:6
ISBN (Electronic)9781450364485
ISBN (Print)9781450364485
DOIs
Publication statusPublished - 27 Aug 2018
Event13th International Conference on Availability, Reliability and Security - Hamburg, Germany
Duration: 27 Aug 201830 Aug 2018
https://dl.acm.org/citation.cfm?doid=3230833.3230856

Conference

Conference13th International Conference on Availability, Reliability and Security
Abbreviated titleARES 2018
Country/TerritoryGermany
CityHamburg
Period27/08/1830/08/18
Internet address

Keywords

  • Denial-of-Service, Internet-of-Things, LoRaWAN, Vulnerability

Fingerprint

Dive into the research topics of 'Denial-of-Service Attacks on LoRaWAN'. Together they form a unique fingerprint.

Cite this